Covert communication in the presence of an uninformed jammer

TV Sobers, BA Bash, S Guha… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Recent work has established that when transmitter Alice wishes to communicate reliably to
recipient Bob without detection by warden Willie, with additive white Gaussian noise …

UAV-relayed covert communication towards a flying warden

X Chen, M Sheng, N Zhao, W Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Owing to the ever increasing of information privacy requirement, covert communication has
gained more and more attention, whose effective range is limited by the trade-off between …

Reliable deniable communication: Hiding messages in noise

PH Che, M Bakshi, S Jaggi - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Alice may wish to reliably send a message to Bob over a binary symmetric channel (BSC)
while ensuring that her transmission is deniable from an eavesdropper Willie. That is, if …

Covert wireless communication with artificial noise generation

R Soltani, D Goeckel, D Towsley… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communication conceals the transmission of the message from an attentive
adversary. Recent work on the limits of covert communication in additive white Gaussian …

Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges

Y Jiang, L Wang, HH Chen, X Shen - Proceedings of the IEEE, 2024 - ieeexplore.ieee.org
Physical layer covert communication is a crucial secure communication technology that
enables a transmitter to convey information covertly to a recipient without being detected by …

Covert communication in relay-assisted IoT systems

C Gao, B Yang, X Jiang, H Inamura… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) systems are of paramount importance to provide ubiquitous wireless
connectivity for smart cities. However, such systems are facing security challenges due to …

Demonstration of entanglement-enhanced covert sensing

S Hao, H Shi, CN Gagatsos, M Mishra, B Bash… - Physical Review Letters, 2022 - APS
The laws of quantum physics endow superior performance and security for information
processing: quantum sensing harnesses nonclassical resources to enable measurement …

Covert communication gains from adversary's ignorance of transmission time

BA Bash, D Goeckel, D Towsley - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The recent square root law (SRL) for covert communication demonstrates that Alice can
reliably transmit O (√ n) bits to Bob in n uses of an additive white Gaussian noise (AWGN) …

Communication without interception: Defense against modulation detection

MZ Hameed, A György… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
We consider a communication scenario, in which an intruder tries to determine the
modulation scheme of the intercepted signal. Our aim is to minimize the accuracy of the …

Mean-field artificial noise assistance and uplink power control in covert IoT systems

S Feng, X Lu, S Sun, D Niyato - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
In this paper, we study a covert Internet of Things (IoT) system. Compared with conventional
IoT systems that apply cryptography and information-theoretic secrecy approaches to secure …